- Arts & Culture 6396
- Books in Foreign Languages 148
- Business & Economics 4475
- Computers 2201
- Dictionaries & Encyclopedias 634
- Education & Science 97384
- Abstracts 1172
- Astrology 12
- Astronomy 13
- Biology 32
- Chemistry 5288
- Coursework 4140
- Culture 30
- Diplomas 2512
- Drawings 1480
- Ecology 29
- Economy 342
- English 1173
- Entomology 2
- Ethics, Aesthetics 23
- For Education Students 26070
- Foreign Languages 117
- Geography 19
- Geology 17
- History 313
- Maps & Atlases 36
- Mathematics 14523
- Musical Literature 7
- Pedagogics 232
- Philosophy 190
- Physics 15878
- Political Science 126
- Practical Work 135
- Psychology 468
- Religion 44
- Russian and culture of speech 101
- School Textbooks 69
- Sexology 68
- Sociology 48
- Summaries, Cribs 723
- Tests 20917
- Textbooks for Colleges and Universities 211
- Theses 188
- To Help Graduate Students 23
- To Help the Entrant 114
- Vetting 426
- Works 58
- Информатика 15
- Engineering 3356
- Esoteric 950
- Fiction 3298
- For Children 383
- House, Family & Entertainment 2506
- Law 2811
- Medicine 1155
- Newspapers & Magazines 344
- Security 274
- Sport, Tourism 1000
- Website Promotion 654
Information security. Test. (52 Issues).
Uploaded: 26.08.2014
Content: 40826151532653.rar 58,51 kB
Seller

Seller will give you a gift certificate in the amount of
Product description
The list of questions:
***** - This assignment subjects and objects of access identifiers and compare the presented identifier to the approved list.
***** - Is the process of encryption or decryption of information and the most powerful means of ensuring confidentiality.
*** - Is the process of authentication of arbitrary data presented in electronic form.
*** - It is a means of authentication, represents the hallmark of this person.
*** - Is a means of access authentication, which is a feature of the subject or object access.
***** Is a set of automated methods for identification and / or authentication of people based on their
physiological and behavioral characteristics.
Analysis of the accumulated information held operatively in real time or periodically, - is:
In the life cycle of information services are the following steps:
In the process of recovery planning are the following steps:
The structure of the digital certificate includes:
The main principles of the security architecture include:
Actions performed in the framework of existing powers, but violate the security policy - is:
Information infrastructure includes the following elements:
The upper level of the security policy solutions include:
By areas of physical security include:
The lower level of security policy solutions include:
To maintain the performance include the following areas:
For procedural information security include:
The middle level of security policy solutions include:
For physical infrastructure include:
The objectives of the program are top-level security:
The objectives of the program are low-level security:
The advantages of the signature of the method include:
The advantages of statistical methods include:
As viruses are classified according to the destructive capacity?
As viruses are classified according to infect the operating system?
As viruses are classified according to the characteristics of the algorithm work?
As viruses are classified according to the habitat?
What are the main properties have a computer virus?
Cryptographic techniques allow:
One and the same secret key is used and encryption, decryption and data used for:
Basic principles of personnel management are to:
The behavior of a user or component of the information system, which is malicious or atypical - is:
The policy should cover the average level, including the following topics:
The principle of minimizing privileges prescribes:
The principle of separation of duties provides:
Security program is described in the next number of levels:
The reaction to the violation of the security regime pursues the following main objectives:
Props electronic document designed to protect against counterfeiting, the resulting cryptographic transformation
information and allows you to identify the owner of the signature key certificate, as well as to establish the absence of distortion of information in a document - it is:
From a practical point of view, the security policy is appropriate to consider at
The collection and storage of information about events taking place in the information system - is:
Tools designed to identify vulnerabilities for the purpose of prompt responses - is:
Network with moderate confidence of security, which are submitted outside information services organizations - is:
The collection of documented decisions made by management and to protect the information and associated
It resources - is:
The set of conditions under which an attack is considered to be taking place, which is a predetermined reaction - is:
Means of access control customers from one set to another set of servers - is:
Trudnoobratimoe data conversion is generally realized by means of symmetric encryption with the binding of the blocks - is:
Additional information
Physical protection, which is among the measures of the procedural level, focused on:
Formation of the work program in the field of information security and ensure its implementation, while stressing the necessary resources
and controlling the state of affairs - this is the main goal of the measures
What is meant by information security?
What is data protection?
Screening is intended for:
Feedback
0